I dont know if I'm the only one but what I'm missing in this "tool" is another HEX conversion for sql injections. lets say you want to use "load_file(0x746573742F75736572732E4D5944)". it would be great to have another button for this.

Ah yeah okay I'm still not sure why anyone wants to convert "shellcode" since it doesn't give you information, and if it gives you information you still don't know about the register addresses in question. Which renders shellcode conversion useless, but only in "real" shellcode. If that is what you talk about.

That isn't shellcode, does anyone really have any idea why peeps genarate shellcode at all, and what it's used for? it isn't just crap you jam through a converter my friends, since most is plain hexadecimal only escaped which you obtain as opcode, depending on the language and system. I can't think of any reason why you should "convert" shellcode back.